Gibson> Download Garbage
Ctrlk
  • Statement of purpose
  • Techniques
    • Intelligence Gathering
    • Initial Access
    • Execution
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
    • Infrastructure
    • Web application testing
    • Other
    • Red Team Infrastructure
    • Malware
  • Tools
    • Tools
Powered by GitBook
On this page
  • Template functions
  • Technique examples
  • Malware examples

Was this helpful?

  1. Techniques

Malware

TBC - Just some handy reference links for now

Template functions

LogoUACME/Source/Shared at master · hfiref0x/UACMEGitHub
LogoGitHub - vxunderground/VX-API: Collection of various malicious functionality to aid in malware developmentGitHub
LogoGitHub - TheAlgorithms/C-Plus-Plus: Collection of various algorithms in mathematics, machine learning, computer science and physics implemented in C++ for educational purposes.GitHub
LogoGitHub - TheAlgorithms/C: Collection of various algorithms in mathematics, machine learning, computer science, physics, etc implemented in C for educational purposes.GitHub

Technique examples

LogoGitHub - skahwah/encrypt: Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.GitHub
LogoVXUG-Papers/Hells Gate at main · vxunderground/VXUG-PapersGitHub

Malware examples

LogoGitHub - rad9800/WTSRM: WTSRMGitHub
LogoGitHub - Allevon412/TeamsImplantGitHub
LogoGitHub - joshfaust/Alaris: A protective and Low Level Shellcode Loader that defeats modern EDR systems.GitHub
PreviousGophish Docker reverse proxyNextTools

Last updated 3 years ago

Was this helpful?